Static task
static1
Behavioral task
behavioral1
Sample
5abf58a7c544b3995395ca191b029c9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5abf58a7c544b3995395ca191b029c9f.exe
Resource
win10v2004-20231222-en
General
-
Target
5abf58a7c544b3995395ca191b029c9f
-
Size
216KB
-
MD5
5abf58a7c544b3995395ca191b029c9f
-
SHA1
590f9ee840154ff36ec18fb985e0d3b5285722f7
-
SHA256
21e7387df3b9847ce6b89b73f2bfb993c82888c629b5707c64702c72eaa8d04e
-
SHA512
3c0fecc268c8c06675433825443227b9793702ef79799c090ea7e8e37046e95f116b98a5763123069dde3142b778e53b0e3aa787737fcdecb42e67f60b9fd871
-
SSDEEP
3072:FlE8DewkiIqEqS9vzswNF4w7Afu/cUG7JHkhM:FlfCwyqER9v4W2BmkVe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5abf58a7c544b3995395ca191b029c9f
Files
-
5abf58a7c544b3995395ca191b029c9f.exe windows:4 windows x86 arch:x86
ffdecdfa9cb0cea49cc97377d55f41e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthA
GetExitCodeProcess
GlobalUnWire
QueryDosDeviceA
GetFullPathNameA
GetPrivateProfileSectionNamesA
VerifyVersionInfoA
HeapQueryInformation
GetCommTimeouts
ExitProcess
GetProcessHeaps
GetCurrentProcess
GetCurrentDirectoryA
OpenEventA
LocalUnlock
GetProcessHeap
EnumResourceNamesA
lstrlen
PeekConsoleInputA
UnmapViewOfFile
CreateTimerQueue
VirtualAllocEx
GetStringTypeExA
GetPrivateProfileStringA
RaiseException
GetFileAttributesExA
GetConsoleCursorInfo
shell32
SHGetSpecialFolderPathA
mpr
WNetGetConnectionA
winmm
timeEndPeriod
timeGetTime
Sections
.itext Size: - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 204KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ